Tech Made Simple

Hot Topics: How to Fix Bluetooth Pairing Problems | Complete Guide to Facebook Privacy | How to Block Spam Calls | Snapchat Symbol Meaning

author photo

How to Tell if Your Phone Has Been Hacked

by on February 15, 2023
in Privacy, Phones and Mobile, Mobile Apps, Tips & How-Tos :: 729 comments

Techlicious editors independently review products. To help support our mission, we may earn affiliate commissions from links contained on this page.

Updated by Suzanne Kantra on 2/15/2023 with new research and interviews with Keatron Evans, Principal Security Advisor at Infosec Institute, Sachin Puri, Vice President of Marketing at McAfee, and Jakub Vavra, Threat Analyst at Avast.

From email to banking, our smartphones are the main hub of our online lives. No wonder smartphones rival computers as common targets for online hackers. And despite the efforts of Google and Apple, mobile malware continues to land in official app stores – and these malicious apps are getting sneakier.

There are three main types of threats faced by mobile users: malware apps, adware, and spyware. According to the McAfee 2022 Mobile Threat Report, mobile malware apps are mainly masquerading as gaming hacks, cryptomining, and messaging apps to gather account logins, charge fees for bogus services, and sign users up for premium text services. In its 2022 State of Malware Report, MalwareBytes reported a rise in aggressive adware – ads that appear in notifications, the lock screen, and in popups – and highlights the fact that preinstalled malware on inexpensive Android devices continues to be a serious problem. Spyware is software that monitors a device’s content, programs that harness a device’s internet bandwidth for use in a botnet to send spam, or phishing screens that steal a user’s logins when entered into a compromised, legitimate app. It is often unintentionally downloaded from non-official sources that people visit in phishing links sent via email or text messages, as well as malicious websites.

Then there are the commercial spy apps that require physical access to download to a phone. These apps are often installed by those well-known to the victim, such as a partner or parent, and can monitor everything that occurs on the device.

There are technological means and motives for hackers, governments, and even the people we know, such as a spouse or employer, to hack into our phones and invade our privacy. However, unless you’re a high-profile target – journalist, politician, political dissident, business executive, criminal – that warrants special interest, it’s far more likely to be someone close to you than a government entity doing the spying.

Not sure if you may have been hacked? We spoke to Keatron Evans, principal security advisor for Infosec Institute, Sachin Puri, Vice President of Marketing at McAfee, and Jakub Vavra, Threat Analyst at Avast, about how to tell if a smartphone might have been compromised. And, we explore the nine ways your phone can be hacked and the steps you can take to protect yourself.

What are the signs your phone may have been hacked

1. Noticeable decrease in battery life

While a phone’s battery life inevitably decreases over time, a smartphone that has been compromised by malware may start to display significantly decreased battery life. This is because the malware – or spy app – may be using your phone's resources to scan the device and transmit the information back to the hacker's server.

(That said, simple everyday use over time can also shorten your phone's battery life. Check if that’s the case by running through these steps for improving your Android or iPhone battery life.)

2. Sluggish performance

Do you find your phone frequently freezing or specific applications crashing? This could be a sign that malware is overloading your phone’s resources or interfering with other applications. You may also experience continued running of applications despite efforts to close them, or even have your phone crash and/or restart repeatedly.

(As with reduced battery life, many factors could contribute to a slower phone. One main contributor can be running out of storage space, so try freeing up space on your Android or iPhone.)

3. Phone feels hot when not using or charging it

Malware or apps, like bitcoin miners, running in the background can cause your phone to run hot or even overheat, according to Vavra. If your phone feels hot to the touch and it's not in use or on your charger, it could be a sign that malware is present. Try turning your phone off and on to see if the problem goes away. If not, there may be cause for concern.

4. High data usage

Another sign of a compromised phone is an unusually high data bill or running out of data before the end of the month. Extra data use can come from malware or spy apps running in the background and sending information back to their server.

For iPhones, go to Settings > Cellular and scroll down to see the list of apps using cellular data. You can check the current and last billing periods.

For plain Android phones (Google Pixels phones), go to Settings > Network & Internet > SIMs > App data usage. For Samsung phones, go to Settings > Connections > Data usage > Mobile data usage. Or, search for "data usage" in the search bar of the Settings app.

5. Outgoing calls or texts you didn’t send

If you see lists of calls or texts to numbers you don’t know, be wary. These could be premium-rate numbers that malware is forcing your phone to contact, the proceeds of which land in the cyber-criminal’s wallet. In this case, check your phone bill for any costs you don’t recognize.

6. Mystery pop-ups and apps

While not all pop-ups mean your phone has been hacked, constant pop-up alerts could indicate that your phone has been infected with adware, a form of malware that forces devices to view certain pages that drive revenue through clicks. Even if a pop-up isn’t the result of a compromised phone, pop-ups coming from external sources can include phishing links that attempt to get you to type in sensitive info or download malware.

You may also find apps on your phone that you didn't download and could be signs malware has been installed on your device. If you don't recall downloading the app, you can press and hold on the app icon (Android) and click on the option for App info. Scroll down and the App details section will tell you were the app was installed from (should be Google Play Store). Click on App details to go to the Google Play Store, where you can check the app is a legitimate app from a trustworthy developer. For Apple owners, go to the App Store and tap on your profile icon, select Purchased > My Purchases, and search for the app name.

7. Unusual activity on any accounts linked to the device

If a hacker has access to your phone, they also have access to your accounts – from social media to email to various lifestyle or productivity apps. This could reveal itself in activity on your accounts, such as resetting a password, sending emails, signing up for new accounts whose verification emails land in your inbox, or moving emails to trash that you don’t remember seeing (especially those verification emails).

In this case, you could be at risk for identity fraud, where criminals open new accounts or lines of credit in your name, using information taken from your breached accounts. It’s a good idea to change your passwords – without updating them on your phone – before running a security sweep on your phone itself.

How your phone can be hacked and what you can do to prevent it

From targeted breaches and vendetta-fueled snooping to harvesting data from the unsuspecting, here are nine ways someone could be spying on your cell phone – and what you can do about it.

1. Spy apps

There is a glut of phone monitoring apps designed to covertly track someone’s location and snoop on their communications. Many are advertised to suspicious partners or distrustful employers, others are marketed as legitimate tools for safety-concerned parents to keep tabs on their kids. Such apps can be used to remotely view text messages, emails, internet history, and photos; log phone calls and GPS locations; some may even hijack the phone’s mic to record conversations made in person. Basically, almost anything a hacker could possibly want to do with your phone, these apps would allow.

Techlicious has studied consumer cell phone spying apps and found they could do everything they promised. Worse, they were easy for anyone to install, and the person who was being spied on would be none the wiser that their every move was being tracked. Commercial spyware programs, like Pegasus, sold to law enforcement and government agencies (including in countries with poor human rights histories), don't even require direct access to the device.

“The purpose of spyware is to be undetectable. Generally, if it's sophisticated, it may be very difficult to detect,” says Vavra.

Likelihood

Spyware apps are not available on Google Play or Apple's App Store. So someone would have to jailbreak your iPhone or enable unauthorized apps on your Android phone and download the spyware from a non-official store. Parental monitoring apps, which are available in Google Play and the App Store, have similar features for tracking and monitoring, but they aren't designed to be hidden from view.

How to protect yourself

  • Since installing spy apps requires physical access to your device, putting a passcode on your phone greatly reduces the chances of someone being able to access your phone in the first place. And since spy apps are often installed by someone close to you (think a spouse or significant other), pick a code that won’t be guessed by anyone else.
  • Go through your apps list for ones you don’t recognize.
  • Don’t jailbreak your iPhone. If a device isn’t jailbroken, all apps show up in the App Library. If it is jailbroken, spy apps are able to hide deep in the device, and whether security software can find it depends on the sophistication of the spy app. For iPhones, ensuring your phone isn’t jailbroken also prevents anyone from downloading a spy app to your phone, since such software – which tampers with system-level functions - doesn’t make it into the App Store. The easiest way to tell if your iPhone has been jailbroken is the existence of an alternate app store, like Cydia or Sileo. They may be hidden, so search for them. If you find one, you'll need to restore your phone to factory settings. Back up your phone and then go to Settings > General > Reset > Erase All Content and Settings.
  • If you have an Android phone, go to Settings and search for "install unknown apps" and make sure all sources are set to off.
  • Download a mobile security app that will scan for rogue apps. We recommend Avast, Bitdefender, or McAfee.

2. Phishing messages

Whether it’s a text claiming to help you recover a package or a friend exhorting you to "check out this photo of you last night", text messages containing deceptive links that aim to collect sensitive information (otherwise known as phishing or “smishing”) continue to make the rounds. And with people often checking their email apps throughout the day, phishing emails are just as lucrative for attackers.

Periods such as tax season tend to attract a spike in phishing messages, preying on people’s concerns over their tax returns. You'll also see a rise after natural disasters, asking people to donate.

Android phones may also fall prey to texts with links to download malicious apps. Android won't allow you to install apps from sources outside the Play Store unless you change your install permissions in Settings to allow unknown app, so it's safest to always keep these set to "Not allowed". The same scam isn’t workable for iPhones, which are commonly non-jailbroken and, therefore, can’t download apps from anywhere except the App Store.

Likelihood

Quite likely. While people have learned to be skeptical of emails asking them to click links, people tend to be less wary when using their phones.

How to protect yourself

  • Keep in mind how you usually verify your identity with various accounts – for example, your bank will never ask you to provide your password or PIN via text message or email.
  • Check the IRS’s phishing section to familiarize yourself with how the tax agency communicates with people, and verify any communications you receive.
  • Avoid clicking links in texts from numbers you don’t know or in unusual messages from friends.

3. Unauthorized access to iCloud or Google account

Hacked iCloud and Google accounts offer access to an astounding amount of information backed up from your smartphone – photos, contacts, location, messages, call logs, and saved passwords. This information can be used for phishing or blackmail.

Additionally, access to your Google account means access to your Gmail, the primary email for many users. The ability to use your email for verification codes to your accounts can lead to a domino effect of hacking all the accounts your email is linked to – from your Facebook account to your mobile carrier account, paving the way for identity theft.

Likelihood

If you use a weak password, it won’t be difficult for a hacker to gain access to your account.

How to protect yourself

  • Create a strong password for all your accounts (and, as always, your email). We recommend using a password manager so you can use strong passwords without needing to memorize them. Password managers can also generate strong passwords, making the process even easier.
  • Enable login notifications, so you are aware of sign-ins from new computers or locations.
  • Enable two-factor authentication (2FA) so that even if someone discovers your password, they can’t access your account without access to your 2FA method.
  • To prevent someone from resetting your password, lie when setting up password security questions. You would be amazed by how many security questions rely on information that is easily available on the Internet or is widely known by family and friends.

4. SIM swapping

Last year, the FBI announced that it saw a significant rise in SIM swapping complaints. With SIM swapping, cybercriminals call up cellular carriers to pose as legitimate customers who have been locked out of their accounts. By providing stolen personal information, they’re able to get the phone number ported to their own device and use it to ultimately take over a person’s online accounts, including virtual currency accounts.

Likelihood

SIM swapping is not common, but it is on the rise.

How to protect yourself

  • Make sure you have your cellular account protected by an account passcode. Don’t use guessable numbers for your carrier PIN – like your birthday or family birthdays, all of which could be found on social media.
  • For AT&T, log into your AT&T account, select Account settings > Linked accounts > Manage extra security and make sure "Extra security" is checked in the Account Passcode tile.
  • For T-Mobile, log into your T-Mobile account with the T-Mobile app and select Account > Profile Settings > Privacy and notifications > SIM protection, and toggle on SIM protection for your accounts and select "Save Changes."
  • For Verizon, log into your Verizon account with the Verizon app. Select Account Settings > Number Lock and toggle on for all of your accounts and select "Save Changes."

5. Hacked phone camera

The prevalence of video calling has highlighted the importance of securing computer webcams from hackers – but that front-facing phone cam could also be at risk. To gain access to your phone's camera, hackers would need to have the ability to run software remotely in a remote code execution (RCE) attack. In 2021, a vulnerability found in Qualcomm and MediaTek chips used in two-thirds of all phones sold that year put people at risk of RCE attacks, including streaming video from the phone's camera. This vulnerability was quickly patched, but RCE vulnerabilities regularly crop up, including Apple's recent update to old iPad and iPhones.

Likelihood

While RCE vulnerabilities continue to be a problem, cameras are not usually the target. Hacking is unlikely unless someone has physical access to install an app on your phone.

How to protect yourself

Always download security updates for all apps and your device.

6. Apps that over-request permissions

While many apps over-request permissions for the purpose of data harvesting, some may be more malicious and request intrusive access to everything from your location data to your camera roll. Puri notes that "Cheating tools and hacking apps are popular ways to get extra capabilities in mobile games. Criminals are exploiting this by promoting game hacking apps that include malicious code on legitimate messaging channels." Other types of apps that have been known to deliver malware include camera filters, photo editors, and messaging apps. And last year, McAfee identified a group of "cleaner apps" that purportedly removed unneeded files or optimized battery life, but actually installed malware on millions of devices.

Likelihood

It's common to run into apps that over-request permissions.

How to protect yourself

  • Read app permissions and avoid downloading apps that request more access than they should need to operate.
  • For Android, download a mobile security app such as Avast, Bitdefender, or McAfee that will scan apps before downloading and flag suspicious activity on apps you do have.

7. Snooping via open WiFi networks

The next time you happen upon a password-free WiFi network in public, be careful. Nefarious public hotspots can redirect you to lookalike banking or email sites designed to capture your username and password. It's not necessarily a shifty manager of the establishment you’re frequenting who's behind the ruse. For example, someone physically across the road from a coffee shop could set up a login-free WiFi network named after the café in hopes of catching useful login details for sale or identity theft.

Likelihood

If you're using a legitimate public WiFi network, Vavra says that "there are now enough safeguards it [snooping] shouldn't be too much of an issue." Most websites use HTTPS to encrypt your data, making it worthless to snoopers.

How to protect yourself

  • Use the apps on your phone to access email, banking, etc., rather than your browser, and you will be protected against malicious redirects.
  • Vavra says that "VPN adds another layer of encryption and essentially creates a more secure tunnel between the user and the website. While HTTPS only covers the communication data, VPN encrypts all data sent and can be used to change user location as perceived by the website or service the user is communicating with. So even the ISP (Internet provider) doesn’t see what is sent." Paid versions of mobile security apps often include a VPN, and we like Nord VNP and, for a free option, Proton VPN.

8. SS7 global phone network vulnerability

A communication protocol for 2G and 3G mobile networks, Signaling System No 7 (SS7), has a vulnerability that lets hackers spy on text messages, phone calls, and locations. The security issues have been well-known for years, and hackers have exploited this hole to intercept two-factor authentication (2FA) codes sent via SMS from banks. According to Evans, his method could also be used to impersonate a user's identity by spoofing their MSISDN or IMSI number, intercept calls, locate the user, commit billing fraud, and launch a Denial of Service (DoS) attack, which could bring down the network.

Likelihood

Evens says that the likelihood is pretty low of experiencing this type of hack. The major U.S. carriers have shut down their 3G service, and Evans estimates that only about 17 percent of the world still uses 2G or 3G networks.

How to protect yourself

  • Choose email or (safer yet) an authenticator app as your 2FA method, instead of text message. We like Authy and Google Authenticator.
  • Use an end-to-end encrypted message service that works over the internet (thus bypassing the SS7 protocol). WhatsApp and Signal encrypt messages and calls, preventing anyone from intercepting or interfering with your communications.
  • Keep your device updated.
  • If you want to be extra careful, Evans suggests, "If you're traveling abroad, get a cheap phone that you can almost use as a disposable and get rid of it when you get back or getting ready to return."

9. Fake cellular towers, like the FBI’s Stingray

The FBI, IRS, ICE, DEA, U.S. National Guard, Army, and Navy are among the government bodies known to use cellular surveillance devices (the eponymous StingRays) that mimic bona fide network towers. StingRays, and similar ISMI pretender wireless carrier towers, force nearby cell phones to drop their existing carrier connection to connect to the StingRay instead, allowing the device’s operators to monitor calls and texts made by these phones, their movements, and the numbers of who they text and call. As StingRays have a radius of about half a mile, an attempt to monitor a suspect’s phone in a crowded city center could amount to tens of thousands of phones being tapped.

The American Civil Liberties Union has identified over 75 federal agencies in over 27 states that own StingRay-type devices but notes that this number is likely a drastic underestimate. In 2015, the Department of Justice started requiring its agencies to obtain warrants for using StingRay-type devices, but this guidance doesn't apply to local and state authorities. Several states have passed legislation requiring a warrant for use, including California, Washington, Virginia, New York, Utah, and Illinois.

Likelihood

While the average citizen isn’t the target of a StingRay-type operation, it’s impossible to know what is done with extraneous data captured from non-targets.

How to protect yourself

Use encrypted messaging and voice call apps, particularly if you enter a situation that could be of government interest, such as a protest. WhatsApp and Signal encrypt messages and calls, preventing anyone from intercepting or interfering with your communications. Most encryption in use today isn’t breakable, and a single phone call would take 10-15 years to decrypt.

From security insiders to less tech-savvy folk, many are already moving away from traditional, unencrypted communications – and perhaps in several years, it will be unthinkable that we ever allowed our private conversations and information to fly through the ether unprotected.

[image credit: hacker smartphone concept via BigStockPhoto]

Natasha Stokes has been a technology writer for more than seven years covering consumer tech issues, digital privacy, and cybersecurity. As the features editor at TOP10VPN, she covered online censorship and surveillance that impact the lives of people around the world. Her work has also appeared on BBC Worldwide, CNN, Time, and Travel+Leisure.


Discussion loading

I think my phone h'been

From bhargavi prabhakaran on November 26, 2017 :: 12:55 pm

I think my phone h’been hacked , whenever I tried to call some one firstly it is coming like engage ,data is getting over very fast and now my music app playing songs automatically and increasing and decreasing volume by its own.how it’s hacked r not how to find . please help me to find

Reply

Haced my phone

From Mathan on November 29, 2017 :: 9:35 am

Hello sir, I am Mathan. I think someone
else hacked my phone. I doubt it.please
Help me.How do find?

Reply

Follow our advice above

From Josh Kirschner on November 29, 2017 :: 9:41 am

You don’t say why you think someone hacked your phone, but if that is your concern, you can start by following our advice above.

Reply

My cellphone has been hacked

From Andy briney on July 08, 2019 :: 12:15 pm

Help me my cellphone has been hacked it is pretty bad when someone has nude pictures of you

Reply

Help me plz

From Christy Watson on August 19, 2021 :: 2:05 pm

my phone had be hacked my my x he see everything I say are some one send me know we’re I am at everything thing he knows I am not good on phone that much because I can’t read real good can u help me plz Thanks C.W

Gratitude

From Alan on December 03, 2017 :: 9:44 am

Natasha Stokes I love u

Reply

Could there be Spyware on my email?

From Jackie on December 03, 2017 :: 1:38 pm

Hi Josh
I wrote the above comment. I apologize for the typos, which occurred because when I entered my Gmail address in the comment reply field, once again I had the extremely frustrating slow-down problem.The response to my key strokes at those times is so slow I can barely type. Ahhhhh!!!! I suspect it is some type of Spyware used to monitor those particular emails. The battery will drain very quickly at those times as well. Right now I am able to type normally, as i have left the email field blank right now.

To explain my situation further, I have been harassed for about 3 years. I had presumed that the people doing it were a small group who had a personal vendetta against me, but recently I discovered there was a connection to a cult group called NXIVM. This grouo is currently under criminal investigation. Check out the news stories- they are a scary bunch ogmf people. I’ve never been a member of this group, but I knew someone who was involved with them, and I believe I was targeted by them because of this.

The Facebook issue I mention is also connected,  as the person who sent the friend request apparently works for Nxivm, and the other fake page was made in the name of another victim of their harassment. If you have any ideas what I should do, I would appreciate it.

Reply

Did you follow the steps above?

From Josh Kirschner on December 03, 2017 :: 3:31 pm

Slow response to keystrokes likely means some other program is running in the background that is taking up your phone’s resources. It could be spyware, but it could be something else, as well. And it wouldn’t surprise me to see this on an older device or if you haven’t restarted your phone for some time.

Since you are concerned about spyware, did you follow our advice above and download Lookout or another security app to do a scan? If it doesn’t find anything, then I would do a factory data reset and then only re-install those apps you really need and see if that resolves the issue.

As for Facebook, you can only set up one account on Facebook for a given email address. However, it’s not uncommon for people to set up fake profiles for various scammy reasons. I’ve seen this numerous times with my friends. Once Facebook is notified of the fake account, they’ll take it down, which may be why you saw it disappear.

I’ve read about Nxivm before, but it’s probably a stretch, at this point, to assume they’re connected with your issues. Especially, since you haven’t even determined if there is spyware on your phone, yet.

Reply

Gmail can be used to make multiple fb profiles

From Jackie on December 03, 2017 :: 11:21 pm

Josh
You can apparently make 2 fb profile pages using the same gmail address. I didn’t know this either,and I only found this out after this strange occurrence with the fb profiles, and I started trying to find out how it happened. I know that the older of the 2 accounts was definitely created with a Gmail address.

You didn’t understand what happened with the fb profiles.  Sorry. I will explain it in more detail. The account did NOT disappear. It’s still there. BTW, Facebook will only remove a fake account if a certain number of people complain about it. I think its 20 people.

This fake account was made to impersonate an old friend. I was monitoring the account to see if anything was posted on it (nothing ever was besides the initial picture )I knew the profile was fake, but I didn’t know it was connected in any way to this other profile. I sent a friend request to the real account. This person accepted the request. Immediately upon accepting the request,  both fb pages in question stopped functioning normally. The pages did not dissappear. What happened was that when I clicked on the link to either page,  the page did not open. Instead, I got a screen saying there was some type of error. All other fb profiles were normal. Only these 2 behaved like this.

I then asked the owner of the first page to unfriend me, which he did. When he unfriended my page, both pages returned to normal. So there is very definitely a link between the 2 pages. Both pages have similar contact info,too. For example one page is:
/John.Doe.5 and the other is
/Bob.Smith.5
So both addresses end in a 5. I checked many other pages and couldn’t see any others that happened to end in a 5.

And yes, you really can make 2 pages from one gmail. Look it up. Gmail will allow you to do this when you add a dot somewhere on the address.

The keystroke problem only happens in certain situations…one situation being while I type emails to the person who has the fb account in question.

These people are definitely involved with NXIVM. I am not connected myself. NXIVM is well known for stalking, harassing and hacking anyone they take issue with. The Bronfman sisters even put Spyware on their own fathers computer. This information is true, and you can look it up if you don’t believe me.

Sorry if I sound a little defensive. I have been harassed for 3 years. This has included many death threats, weird pranks, and also property vandalism.

Reply

Let's tackle one thing at a time

From Josh Kirschner on December 04, 2017 :: 2:04 am

Run Lookout on your phone and see what, if anything, it finds. If nothing, do a factory reset on your phone (make sure all your photos, contacts, calendar, etc. are backed up first) and see if that resolves your keystroke problem.

Multiple Facebook accounts on 1 gmail

From Karilee Anderson on March 19, 2018 :: 12:47 am

Josh;
When I first set uo my Facebook account,I was unaware that my sister was also helping me set up an account? I ended up with twi accounts that were separated by friend requests and pictures, yet both accounts had the same password? I couldnt combune then ir delete one witgout deleting both? I kept sending help messages snd got no reply? I was switching back and forth and got so frustrated with the whoke mess I stopped using facebook for a couple of years until the end of 2014. All of a sudden everything combined where both accounts were identical so it didn’t matter anymore? Either someone noticed at Facebook and fixed it, or there’s still the second acct., but being identical, I can’t tell the difference? LOL

Reply

Brand new android phone & tablet refuse to hard rest

From Not crazy. Too SMART on May 04, 2021 :: 10:32 pm

I have been dealing with the above mentioned Gang Stalking which I’ve now uncovered is my sister. Cyber-Stalking is the MAIN COMPONANT NEEDED FOR GANG STALKING. I went & purchased a brand new phone. 6 days later my unlimited data & 30GB of hot$pot was gone without me using but the hotspots yet at that point, other than to set up the new tablet I purchased. All of my setting were… Set for 1 device to connect. To shut down after 15mins without use. I set up the tablet & that was it. Shut it off completely. When the phone sent the text that may data would be dropped to the lower speed, I attempted to do a hard rest. It said ACCESS DENIED. There was also something I read while scrolling thru b4 tapping on the WIPE/FACTORY RESET. It said: swapper? If younsee this and are not rebuffing notify (? I dint remebet now. maybe developer?) Immedialy! & repeated this about 6 times. It never did the normal reset where u see the android with the spinning. Any idea why I want get a hard reset to go thru? Also after “build.type=user” & next it said “build.user=jenkins”

Reply

@ Jackie Regarding NXIVM

From Ryan on December 04, 2017 :: 10:16 am

Thanks for posting this. I have been pretty active on this and a related thread. I was telling some of the people that their issues appeared to be Gang Stalking. I have been a victim of it for quite some time. It really got bad when I started dating a woman that claimed to also be a victim of it. Which I saw evidence of every time I went anywhere with her. Interestingly enough, while working on her phone to try to clean any spyware off of it. I noticed the primary email address registered on it was not a normal email address. It was one related to this or a similar Cult/Group that was based in empowerment. Looking into this group really kinda clears a lot of this up.  This group is never going to be taken down by the courts.It’s almost surely be a front for the intelligence community.

Anyone notice how many more of these hacking reports are coming into this thread not that Trump handed a certain space agency 91 Billion a couple weeks ago?  And hey as a bonus. Chemtrails are flying high again now too. Thanks Masa I mean Nasa

Reply

Ever notice anagrams

From TLMC on September 23, 2019 :: 2:01 pm

I like your “typo” MASA vs NASA.
Ever notice that NASA, TSA, and NSA almost spell “satan”? When these organizations interlink, they DO spell Satan.

Reply

@ Jackie Gmail Lag.

From Ryan on December 06, 2017 :: 4:51 pm

Hey, I get the exact same thing. You type in your gmail, and or google search box and the letters populate in a delayed manner.Also you’ll hear your sound split, or break up when clicking on new tabs, or refreshing a web page.  Try running NetAdapterRepair Google it, download it, and click on repair all, and run it.If it hangs on a particular repair, omit that repair and run it again. Then reboot. Also try downloading RogueKiller to check for any spyware. It works really well. You can also download a program called Rkill, and run it any time you think something may be running on your system. It is a quick ac ting program that runs and instantly kills any spyware processes.  This is all for PC by the everyone. Not for your phones. But in my experience they usually hit both. If you want to see how coordinated it is. I can probably bet you that you also receive tons of spam phone calls on your LandLine, and/or Cell phone daily. Always a different number, but seemingly the same people, or no one on the line. Now try going on 800 notes and mentioning the correlation between one of the numbers that are spamming you, and possible gangstalking. Watch how fast they delete your post, and ridicule, or ban you.  Hope this helps some of you.  You know the FBI doesn’t call a T.I. a Targeted Individual in their internal documents. They refer to TI’s as Empowered Individuals. If you’re targeted, you’re probably a good person. Know that, and hang in there. Your purpose in this life will come to you.  I go through this life literally being made to feel as if I will be murdered at almost any waking moment. Kept constantly on edge, and not allowed to sleep for any sustaining period of time. But I’m still here. 

Matthew 10:22
You will be hated by everyone on account of My name, but the one who perseveres to the end will be saved.


Ned Flanders you are not, but you were never expected to be.

Reply

Who are these people..

From K. From Cali. on March 19, 2018 :: 12:56 am

Who are NXIVM? Afraid to look it up? And is it spoken; ” NX 4 M”? And if you weren’t associated with their group, why would they target you? Is this about Gaming?

Reply

More info regarding my Spyware and fb question

From Jackie on December 04, 2017 :: 12:00 am

Josh
The phone is about 1.5 years old.  It’s a galaxy…can’t remember which model.

It is shut down and restarted every once in a while.  I have removed all unused apps and files to free up space.

I have not run a security scan.

The phone also goes thru periods of extreme battery drain. It’s not doing that so much currently, but of course the battery is not as good as it was when the phone was brand new.

Reply

Regarding the Spyware and fb issue

From Jackie on December 04, 2017 :: 4:36 am

Thanks Josh
I am trying more to find out how to confirm if this is hacking by Spyware, as i want evidence to press charges. After seeing this weird thing happen with the Facebook account, I am really convinced this guy is a liar and a criminal, and that he created this fake fb page impersonating my friend in an attempt to cover up some type of criminal activity. Especially as this fake page was created a few hours after I talked to a another victim of this guy, and she posted some info about this on her IG page.The timing of this really made me suspicious, as I’m sure he must have seen the IG post, which in itself has some very nefarious implications. 

There is a very, very long story with all this. Currently I’m not getting much help from the police,(who seem to think the answer to my problem is just to block people) instead of investigating why these people have gone to all this effort to hack me and harass me.

So if this sounds like it is possible Spyware, I want to be able to prove it’s this guy who has installed it, not necessarily uninstall it.

Reply

Proving who installed spyware will be very difficult

From Josh Kirschner on December 04, 2017 :: 1:38 pm

You could take your phone to a specialist for forensic analysis, but this will be very expensive and, even if they discovered spyware, it would be very difficult to prove how the spyware got on the phone. And that’s a lot of investment when there’s not even strong evidence that you might have spyware.

If you run Lookout, it will detect spyware and give you the option to remove it (or not). And at least you’ll know what you’re dealing with. Though, again, proving who put it there will be very difficult.

I’ll be frank, I really don’t follow what you’re describing with the Facebook issue. But since nothing has happened beyond seeing two Facebook profiles out there, I really wouldn’t spend time worrying about it. Focus on getting peace of mind with your spyware question, first.

Reply

Any luck

From Mathew on November 02, 2020 :: 8:21 pm

What ended up happening? Long story, short but I have a cyber bully. Ive changed jobs, moved, numerous things but it’s starting to really get to me and itd be awesome to hear other options

Reply

Regarding the Spyware and fb issue

From Jackie on December 05, 2017 :: 4:46 am

Thanks Josh
I am just trying to figure out what is going on and if it’s possible to prove anything legally.

I know it’s hard to understand my questions about the fb accounts.
The reason I think the fb thing could be important is because I suspect the person who installed the Spyware is also the same person who made the fake profile in a friend’s name.

I’ll give you a bit more info, in case someone else has any ideas how this occurred. So…. I was contacted by email bY person A. This is where I noticed the keystroke issues, and I suspected A had installed Spyware,as the problem occurred only while typing emails to him. Since I had been harassed for some time already, I suspected that “A” was connected to these other harassers.

Meanwhile,I noticed that a fake facebook profile had been opened in the name of a friend, B. B had also been harassed by the people who had harassed me.

I was suspicious of A and wondered why he was emailing me, and I decided to send him a fb friend request to see if he would accept, which he did. After A accepted the request, the link to his FB profile appearred on my friends list, but when I clicked on the link, the page couldn’t be opened, and I received an error message. I wondered what was going on, and I tried looking at other fb profiles to see if the same thing happened on any other profile.

What I found was that the only other fb profile where this same thing occurred was the fake profile for B.

I then asked A to unfriend me, and when he did that ,both profile pages, for A and for B, began to function normally again.

This concerns me because if Spyware has been installed to spy on my Gmail address, this same Gmail address is the one I used to open the fb profile that sent the friend request to A.

So if this Spyware is screwing up my Gmail account, I think it could also screw up my fb profile which was created using that Gmail. Thats Just a guess, but it seems like a possible answer to why “A’s” fb profile was not able to properly connect to my fb profile when I friended him.

*******
RYAN: Yes, these groups are all different factions of organized crime, and they are often connected to each other and to Intelligence groups. Presently, European Intel is out of control…these groups all have access to sophisticated hacking equipment. So if there seems to be increased reports of hacking by gangstalkers (more aptly called the crime cartel) i wouldnt be surprised.
Of course we can’t stop them all, but I just want to be able to stop at least this small group, if I can. If we do nothing at all, then we really are screwed.

Reply

Please,Help me Someone.

From Manju Manju on December 05, 2017 :: 3:17 pm

Today,I have used an app on my android phone"Samsung j7 Nxt” called “Free spyware and malware
remover”,then it’s detected something called “mspy”,
And said to remove from my android device.
I have no idea what it is,from where it is came and who had done this.
i want to know,who is this people.
So, I kindly request all the people here that please
help me to find him/her.
or may be else.
please tell me what i can do for this?

Reply

That's not good

From Josh Kirschner on December 06, 2017 :: 2:04 pm

First of all, I’m not familiar with the antimalware app you’re using (using generic security apps is not a good ideas). You should download Lookout Security or another well-know security providers app and run the scan again to see if it detects mSpy.

If it does, that’s not a good thing. mSpy is a very intrusive spyware program that can reveal almost everything personal on your phone to whomever is using it to spy on you. It’s also important to note that installing MSpy requires someone to have physical access to your phone, so it is often someone you know who put it there.

Unfortunately, finding out who put it there is very difficult. There’s no way to do it yourself. It’s possible paying a forensic analyst may help you gather more information about when it happened, but it won’t be cheap, and still may not reveal much. If there is a crime involved, then the police theoretically could get a warrant and serve it to mSpy to see who registered the corresponding account, though I think the likelihood of that is low.

Your best bet is to remove the spyware and put a lock code on your device that would prevent anyone from getting in to install spyware again in the future.

Reply

i want to findout her/him.

From Manju Manju on December 07, 2017 :: 2:08 am

i mean,people who are trying to do something bad with someone,there is many ways and they are easy as well.
But on the opposite sight to findout them,it is difficult.
No…..
No….i want to findout,whatever she or he is because,i am not giving my phone to anyone,i mean no one.
May possible a person to whom i am totally blind,may do this.
i want to clear this.

please help me.
And give me any suitable option.So that i can find that person on my own.
please…please.

Reply

I can't give you much help

From Josh Kirschner on December 07, 2017 :: 7:34 pm

As I said, figuring out who installed spyware on your phone can be very difficult. You will likely need to hire a forensic technician to examine your device, and then you might still need police to get a warrant for mSpy’s customer records. And I would estimate your success rate will be low with both of them.

First things first, you should make sure you really do have spyware. Use Lookout to scan your device, but don’t have it fix the problem if you intend to take the steps above.

Also, did you buy this phone new or is a pre-owned device? If not new, your phone may have had spyware from a previous owner and the phone was never properly reset.

Reply

thanks.

From Manju Manju on December 08, 2017 :: 7:26 am

it’s okk.
thank you for your suggestions and your response.

Reply

Ryan

From Jackie on December 07, 2017 :: 2:44 am

The keystroke delay is very frustrating,  but it only happens when I email certain people usually. It will also happen on this forum if I enter my Gmail into the email field before I start typing. If I leave the field blank while I type , then it’s fine. Go figure.

I was going to leave the Spyware on the phone and see if the police could find who had installed it, but itlooks like it’s not possible to find that out.

Ryan, I was targeted after I was first bullied by someone on FB and on another forum. The bully is connected to NXIVM…her hubby is one of their lawyers.  I have been trying to piece it together, but I still haven’t understood what their reasoning is in doing this to me. Didn’t even know about NXIVM being connected until I was given a tip recently.


I don’t have the spam call problem, but I know another person also targeted by this cult, who does have the spam phone call problem. The numbers are sometimes not even in service when she calls back. Weird.

If you are interested check out Dr. KATHERINE HORTON on YouTube. She is being severely harassed right now.

Reply

@ Jackie

From Ryan on December 07, 2017 :: 5:53 am

I could pretty much bet that they are the social club this woman is referring to also. Give it a listen. Pretty interesting story. https://youtu.be/OCqjYkX5yj0 

Wish there was a way to PM you. I don’t want to congest this thread with personal chat. I may create an email account to put up here for people to contact me if they want to talk about this stuff. I’m curious as to who is all in California where I am. I know there is a ton of this in Florida, and Texas as well. I’m in the Los Angeles area.  Anyone else?  I think LA is a great place to get the hell out of at this point.

Reply

@Ryan

From Jackie on December 07, 2017 :: 12:51 pm

Holy crap
I didn’t even finish that video, but her story is so scary, and what’s so bizarre is that you are right, Ryan. yhat the way her harrassment started is eerily similar to what happened to me.

In fact I was harassed because these women (who at first pretended to befriend me) tried to keep me from communicating with a man who was interested in me. I should explain - the man was a former friend/love interest but we ended up marrying other people, many years ago. Then I had contacted him online.

I had assumed everything happening to me at first was just personal (the wife and friends of the man probably doing it to bully me)but it’s obviously a much larger group involved than I first believed.

I also eventually discovered that the doctor who operates the website forum involved in the bullying was involved in harassing me himself, as unbelievable as that sounds, I have evidence. He actually changed the time stamp on a post to hide the fact that it was a fake post. He did this after I mentioned, on my social media page, that the post was obviously fake. So he was apparently also reading my tweets. I use Twitter to post evidence and screen shots of their bs.

I’m in Canada Ryan. One of my harassers is in Southern California like you…I have her name and her husbands name. It would be good to start some kind of data bank of names so we could compare.

I am still trying to understand the reasoning behind whY they did this, and how. An interesting note Ryan,in regards to the fake FB profiles. 2 fake-looking profiles were made for my old friend/love interest. They want me to believe he is still married, so they posted 2 pics of him with his wife. One pic was 2 or 3 years old, the other I could see immediately looked weird, and I’ve since determined that the wife was actually photoshopped into the picture, as she is out of proportion. This is a very bizarre level of mentally illness we are dealing with here to actually go to the effort to do this.

Reply

I have info jackie

From Privateofcourse on March 31, 2019 :: 9:28 pm

Jackie, been thru same, have info… yes theyre tied to nexium… but its hard to believe…know this: nexium and relayed make honeypot sites on net, to find out who has info on them… posing as opposite… hence your bully doc….these are pimps to germophobes who break into attractive single persons homes using gumout, (ether) and sell access while knocked out victim never knows, to pervs of wealthy status afraid to visit sex places etc….they are also capable of if filming it and selling in other half of globe for example South America…. the date nix with old flame is to guarantee you stay single…. they iriginated in uostste ny… i recognized your description at once….they operate as a computer virus recruiting more people like a pyramid scheme, and many are high bill drug addicted to be controlled; so for one member, theyre required to take prisoner ten victims, done thru friending and conning..and of those ten, they expect each to lead to ten more, them atop reaping the monies from those they. Victimize….house gets bugged, gang stalk keeps you reigned in and spied on, and many times forwarding on phone to prevent outside help. Make interior locks to prevent lockpicking… secure windows as many new models pop out for cleaning off the tracks… you will be basically model material as am i and im twenty years into them now,  all new discovered in hindsight….they make more off this than drug dealers and pimps combined because the clientele they sell to is elite and wealthy…and sad to say their taking more stalking victims to conquer will likely involve other clan members of your own. Which is how they picked you to begin with….  hard to allow as posdible due to terrifying but thats it in a nutshell….

Reply

I'm in Sunshine State as

From BlowNminds on May 18, 2019 :: 1:05 am

I’m in Sunshine State as u stated above, I have wondered for long time now whether gangstalking was a real thing & if so why would I be targeted? My cell is compromised, I have Lookout but have no control over app it’s self. Will not allow me to change email and password, nor will it allow me to push permissions, update, or disable buttons. Greyed out…..My online banking info was stolen but was able to stop the transfer of 4000 to US Bank acct. before transaction was made. I had the bank name, routing info along with a females first and last name yet was told by authorities there was really nothing they could do and since they did not actually obtain any monies to just resecure bank acct? Wtf has happened to this world we live in? I have friends who no longer answer my calls since on numerous occasions another voice is heard online, both male and female, which apparently freaked them out. I get the calls all day everyday from numbers similar yet always a little different. If u call # back the number is not an actual working number it says. I receive text messages stating “Do not show what I have sent to anyone else, sent with a url in which I would never be stupid enough to connect to. Whoever or whatever it is that controls my cell has the power to change pics I have taken in past and even more recently, I could not take any photo of any type of aircraft for nearly 2 weeks. Literally showed my wife, look through my lens then yours , c how the plane , helicopter etc shows in your screen yet not in mine only yours can take pic while all I get are clouds and sky. She freaked pretty good on that one and I was a little relieved that I had a couple of people as witnesses to this, which is now working.California, Florida & one other state u mentioned, I cannot recall this min. third named, wonder why these states over others and why me over say my neighbor or ball coach? I am no threat as far as I see it. At least I was not in beginning , but I have become quite bitter and angrier as years have passed with these and other things I don’t want to go in detail about right now, continuously happening.The best or only positive I can admit to would be process of fully awakening. Eyes wide open, perceptions & reality never to be as it was. I have also exp. health issues out of blue that stumped all docs and nearly killed me, still possibly could or will. I have a family & cannot come to an answer for why these things are being done or to what benefit to appease self, what sane person could? If this is 100% happening to others and quite possibly myself, I will continue to pray that they have a time limit or stopping point because this is not a life I could ever just get used to living.I should not have worded it (if this is happening) I do know it is happening unfortunately and have compassion to the most high for all victims involved.

Reply

Gang stalking methheads

From TLMC on September 23, 2019 :: 2:13 pm

In Kansas City too.

Reply

Can you share the youtube video again

From alwaysontherun on February 06, 2020 :: 12:54 pm

Can you share the youtube video again please, it says private when I click on the link. Ive been going thru the same things for past 2 yrs. Thank you.

Reply

My laptop and phone have been hacked

From Donna on December 08, 2017 :: 2:51 am

Hello , I was on my laptop when I got a on screen emergency message supposedly from Microsoft saying I needed to call a phone number. I did .. The man said my ip address had been hacked and told me to type in a couple things then he was controlling my laptop he continued with my IP address is now gonna be black listed and I can pay $499 for them to fix it By issuing a new IP address after the malware was removed i told him I didn’t have the money he said in 2 minutes I would no longer be able to use my network .i hung up now my laptop and 1 of my phones wont connect to WiFi saying authentication problem but everyone else’s devices in the house still connect via WiFi without a problem along with 1 of my phones. his can I fix this issue? I’ve already changed my google password

Reply

That's a well-known scam

From Josh Kirschner on December 08, 2017 :: 10:52 am

You probably realize this now, but you fell for the classic “microsoft support scam”. You visited some website that was compromised or simply fraudulent, which then displayed a popup falsely claiming to be a Microsoft system warning. For the benefit of anyone reading this, Microsoft will NEVER display system warnings in this way or ask you to call into an 800-number for service. These messages are always scams to sell you fake or even malicious technical services. And there’s no way to “blacklist IP addresses” in this manner; that’s BS. Now, back to your problem…

It’s a little difficult to determine exactly what this guy did to screw up you IP address without taking a look at your system. But I can give you some steps to try to recover it without taking it in for service.

First, you’ll want to run a complete system scan to see if any malware was installed. If you already have antimalware on your computer, make sure it is turned on (this guy didn’t shut it off) and run a full scan (it may take a while). You should be using a well-known brand - Bitdefender or Norton would be my recommendations.

Step two is to remove any programs this guy may have installed that weren’t picked up by the antimalware. Type “programs” in your windows search bar (the little area at the bottom left of your screen next to the Windows button) and click “Add or Remove Programs”. You’ll see a list of Apps installed on your laptop. Sort the list by Install Date, click on the ones that were installed since your conversation and Uninstall them.

Now if your laptop still won’t connect, he probably changed something in your wireless configuration. This is tricky to diagnose without access to your computer because there are a number of things he could have changed that would screw things up. But let’s start with the most basic - network password. It’s possible he simply changed your password, so right click on the little wireless icon in your taskbar at the lower right. Does it say you are connected to your network? If not, right click on your wireless network and click “forget”. Now do the same thing, this time click “Connect” and enter in your wireless password.

If things are now working, great. If you are connected to your wireless network but still getting that error, then right click on your wireless network and click “properties”. Make sure “Set as metered connection” is Off and IP Assignment should be set to automatic.

If those steps don’t work, things get trickier.
Since others in your house can still access the network, let’s assume that he didn’t actually have you login to your router and change settings there (if he did, let me know). So it might be something with your wireless adapter settings. Go to the Control Panel > Network and Internet > Network Connection > Change Adapter Options. Right click on your wireless network and click Diagnose. I’m doubtful this will find the problem, but might as well give it a shot.

If that didn’t work, before we go changing adapter settings, let’s really confirm whether this is an issue with your wireless in general, your specific network or something else. Try a different browser - does that work? Take your laptop to your local coffee shop or somewhere else with free wireless (or have a friend/relative set up a mobile hotspot). Can you connect to that network?

Reply

help

From santhosh sk on December 08, 2017 :: 11:58 am

Sir my mobile intex 3G and asus 3G intel zenfone. Please tell me my mobile is hacked one year before

Reply

I think I've been hacked through Google on my S7 edge

From I need advice on December 15, 2017 :: 11:55 pm

While I am not new to the world of crypto investment. I’m completely new to trading. Yesterday as I was browsing what’s out there to broaden my exchange horizons I clicked on an ad for one it it immediately popped up you’ve been hacked ect..typical phish attemp. OF COURSE I DIDN’T. TODAY Google links news ect..give error message and will not load. Blue tooth turned itself off when I pull down email window it offers link to incognito browser. Pages that im viewing switch to other links through ChRome which I don’t use often.

PLEASE HELP ME

Reply

For those who are or may be a T.argeted I.ndividual

From D3MON3AT3R on December 17, 2017 :: 6:04 am

“Hello, I have been a T. I. for several years now, even more.
This is a very true and very real possible ( events) that can happen to anybody. All of us can go on social media sites, and state opinions about things like religion and politics, but guess what? The moment you even ” like” a post that you strongly believe, or agree on, this gives the NSA rights to track, hack, jack, and its all under their cover of “Protecting the people from terror”.
Every one of those so called “cell towers” that are put up, and some just meters from another, are all government spy towers.
The NSA works with every cellular phone company in this country.
We’re talking ( T- moble/ Verizon/ Sprint/ Boost/ Cricket/ AT&T/ etc.) ALL OF THEM.
One can look up the company called “ONVOY” and see procedures under law enforcement. Onvoy is a third party middle man that provides information and relay to them, all liable and allowed with out a damn thing but a fax to your provider on what to send to them.

My phone right now is being compromised as the battery is trying to off its self.

Anyway, I know too much.

But lets start at the beginning.
This type of technology was brought over by German engineering shortly after the great war.

They are able to read your thoughts, make you scratch your head, even have a signal sent into your head making you think that a spider on the wall is telling you to kill or be killed.

They rain down on us micro sized bots that we breath in/ drink/ eat/ and from the inside can change the very thought process of an healthy person with no record of mental illness.

They can hypothesize you to shoot thousands of people to get the right to bare arms taken from us. And can have a child kill his classmates while under this hypnosis.

This is very true. Can be looked up anywhere on the web.

I have to go.

PEACE TO YOU ALL.
~§~

Reply

That explains a lot!

From Bluey on March 19, 2019 :: 5:28 pm

Well thanks, you’ve just explained the occupant of the Oval Office.

And btw, i will go sleeveless any time I want.  Thay can’t take THAT away.

Reply

Strange contact appeared

From Michelle on December 25, 2017 :: 12:12 pm

I just noticed today that a contact has been added to my Galaxy S5: You’ve Been Blue Jacked

I can’t find any info on this anywhere. Any thoughts?

Reply

Your the bug

From Johnny floyd on March 09, 2019 :: 10:02 pm

Dude what in the methamphetamine are you talking about?

Reply

Methaphetamine comment

From Mely on March 24, 2019 :: 1:39 pm

Lmfao.. that was funny!

Reply

Help

From Ginge on December 27, 2017 :: 9:17 pm

I was watching stuff on YouTube and then it said switching to x-box and what I was watching popped up on the x-box for a couple of minutes and switched back.ever since then it seems like someone else is on it while I’m on it at the same time I will be scrolling the out of nowhere it will scroll up and down or take me to another app. Or (while typing) it will take me to the search bar twitch and then search up something like bing or some thing. Or it will change my text. It was a hassle to even type here without the hacker taking out and searching something else. I can easily tell when they are on it but it sucks when I can’t type my passcode because it can’t (feel my touch)

Reply

I think my dad got hacked?

From Erik on December 28, 2017 :: 8:51 pm

Hey im not sure if someone hacked my dad’s phone or not but my little sister was using my dad’s phone and while i told her to go to sleep i got a weird text message it said “The only way to go to the next couple days ago, I am not sure how much you love to see the"it couldn’t be her we were in the next room so was this a hacking or something else it was through messaging

Reply

hacked

From vicki on January 01, 2018 :: 4:51 pm

I had a laptop hacked years ago. Person called me on cell (I never gave my number to him). I was polite, friendly, pretended to be relieved and asked questions. He said he hacked me with a keylogger and knew everything about me. My location, address, phone, accounts, passwords, finances, work account and password, internet history (named accounts I made but forgot about) and knew information about other friends. Even knew things I deleted.
I ended the call by saying thank you for telling me. Then went to store, bought CDRs.
1- sent message to a friend about how i was hacked and how i knew hackers isp, location, and other info as well
2- opened on screen keyboard to avoid keystoke tracking
3- backed up only info i wanted to keep
4- changed all passwords
5- deleted all history from email accounts, all pictures and videos saved, all downloaded apps
6- got new account at work and had old one disabled
7- factory reset
8- on screen keyboard again (precaution) and changed all passwords again
9- instead of noting passwords, i made a list of hints that only made sense to me
10- checked cdrs for safe info to transfer, went to websites to download fresh application info
11- ignored all of hackers attempts to contact me
12- got new phone number and service provider
13- noticed hacker friend wanted me to download specific pictures and videos that were stupid to begin with
14- informed friends to check for spyware
15- finally relaxed a little bit
To this day, I never open any links or anything telling me to download something. I constantly review contacts and delete any I dont use regularly. Im always surprised by the ones that sneak back in.
I never ever respond to ‘send to friends’ or any type of chain requests. I delete everything that isnt useful.
I have two unique email accounts that have no contact information at all. One I use for anything financially related. The other one I use to forward information I want to keep by copy/pasting in a new email instead of a direct forward. I have three other email accounts, an empty one that I use as a recovery address, one I use for resume and employment information, and my main “junk” email that I use when I sign up for anything.
Im extremely careful now and my friends know not to send me anything suspicious. When I do get something, I tell them what I got from their account, and remind them to check for malware.
Im cautious on all devices now. I dont want to be hacked again, but I know how to check and reset if I suspect it.
Dont trust something because it came from someone you know… check sender information, isp info, and delete it if it doesnt match up. Skilled hackers can disguise themselves easily by pretending to be someone you know.
Hope this helps at least one person smile

Reply

Thx

From Tim on January 07, 2018 :: 12:37 pm

I looking for an app to install on android Samsung galaxy to detect individual snooping remotely and their device impersonating another individual allowing the number to be seen as person being impersonated

Reply

I know this is odd but what network do u use?

From Gemma Stroud on January 08, 2018 :: 10:15 am

Iv had similar problems at first I thought it was all in my head And I started having weird dreams
Something about the 5 GHz 2 gigahertz Internet connection on my home landline , that I let somebody split… basically given them all access to my router silly I know now I’ve since got rid of the landline and had multiple numbers.  From my mobile device i’ve had New and different iCloud accounts,
I’ve since moved from the network three And I’m now withTesco’s touchwood things seem better I’m not sure if it was the three network or my landline although after my landline was taken out it was still happening since leaving free I found it to be much better not sure why this is and I did think three did a good deal for data and wondered what was the catch.
Also my boy is phone was a Galaxy S7 I found lots certificates that he had trusted foreign and English he is only 10 but Sam certificates gave his phone access to copy data from any phone that was put next to his ...,That is pretty scary stuff how can this happen

Reply

How can I prove it?

From Barbara Jean Sunday on January 10, 2018 :: 5:09 pm

My 16 year old daughter has an LG Rebel Android. Her almost new phone battery was not holding a charge. Then the phone started overheating, and apps started acting strangely. Eventually friends started noticing weird texts from her (some offensive) that she swears she did not send. Is there any way I can prove whether or not this was a hack job?

Reply

Did you follow our advice above?

From Josh Kirschner on January 18, 2018 :: 2:20 pm

Start by downloading one of the security apps we recommended and see if it detects anything on the phone. If not, then the phone is probably clean. Either way, do a factory reset after and see if that resolves your phone overheating/battery issues.

Reply

Ongoing Hacking

From Emma on January 15, 2018 :: 10:33 pm

All my devices including my Roku are compromised and the Hacker is probably using something called Samba 3.0.37 some software.How do I block him from accessing my devices to start with laptop .He basically has access to my Router.

Reply

Read More Comments: 1 2 3 4 5 6 7 8 9 10 11 12 13 14

Love getting helpful tech tips? Subscribe to our free newsletter!

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships
Accessibility Statement
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.